Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2721
A loss of hard drive space that you cannot account for can be a symptom of malware because:
Answer:
Some malware creates many hidden files or copies of itself, taking up disk space.
Some types of malware may download additional malicious modules, create hidden log files, or replicate themselves, all of which can consume a noticeable amount of disk space over time.
2722
What invisible technique tracks user behavior on websites?
Answer:
Web Beacon
Web beacons are hidden code snippets embedded in pages or emails for tracking.
2723
"Scareware" is a type of malware that:
Answer:
Tricks users into buying and downloading unnecessary and potentially malicious software by using fake security alerts.
Scareware is a form of social engineering that uses fear to manipulate users. It often manifests as a pop-up claiming that the user's computer is infected with viruses and that they must purchase a specific piece of software to fix it.
2724
The "Sunburst" malware was a key component of what major cyberattack discovered in 2020?
Answer:
The SolarWinds supply chain attack.
In the SolarWinds attack, hackers compromised the software build process of the SolarWinds Orion platform. They inserted the Sunburst malware into legitimate software updates, which were then distributed to thousands of SolarWinds customers, creating a backdoor into their networks.
2725
Why is it important to be cautious of pop-up windows that claim to have found viruses on your computer?
Answer:
They are often scareware tactics designed to trick you into installing fake antivirus software that is actually malware.
Legitimate antivirus software will not use a web browser pop-up to alert you to a threat. These pop-ups are almost always fake and are a form of scareware designed to defraud or infect you.
2726
Your web browser has new toolbars that you did not install, and your search queries are being redirected to a different search engine. This is a symptom of:
Answer:
A browser hijacker.
Browser hijackers are a type of malware that modifies browser settings without permission. Unwanted toolbars, a changed homepage, and search redirection are all tell-tale signs of this type of infection.
2727
A fileless malware is different from traditional malware because it:
Answer:
Exists only in a computer's memory (RAM) and does not write itself to the hard drive.
Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. Because it does not rely on files and leaves no footprint on the hard drive, it can be very difficult for traditional antivirus software to detect.
2728
If your antivirus subscription expires, what happens?
Answer:
The software will stop receiving updates for new virus definitions, leaving you vulnerable to new malware.
An expired antivirus program is of little use. While it may still be able to detect old viruses it already knows about, it will no longer receive the crucial updates needed to identify and block the thousands of new threats that emerge daily.
2729
A "wiper" is a particularly destructive type of malware that is designed to:
Answer:
Erase all the data from a hard drive and connected storage devices.
Unlike ransomware that holds data hostage, wiper malware's sole purpose is destruction. It is designed to permanently delete or "wipe" all data from the infected system, often leaving it unbootable.
2730
An "intrusion detection system" (IDS) is a tool that:
Answer:
Monitors network or system activities for malicious activity or policy violations and produces reports.
An IDS is like a burglar alarm for a network. It doesn't necessarily stop an attack in progress (that's the job of an Intrusion Prevention System, or IPS), but it is designed to detect suspicious patterns and alert administrators to a potential threat.